Quick Heal Security Threat Report for Q3 of 2014

Mumbai, India, October 21, 2014: The Quick Heal Security Threat Report for the third quarter of 2014 (July -September) has been released. The threat report lists out the top Windows and Android malware that were found dominant in this quarter. It also includes the upcoming malware trends that Netizens can expect in the coming days.The report provides an insightful look into the recently discovered security bug called ShellShock, a.k.a the Bash Bug. It also imparts some useful tips on safe online shopping while using Android mobile devices.

Key findings of Quick Heal Q3 Threat Report for Android:

Quick Heal Threat Research Labs discovered 47 new Android malware families and 218 new variants of previously seen Android malware.

More than 70% of the 1.2 million Android samples detected came under the Adware classification. This is a trend that has continued all throughout 2014.

Android malware samples have almost tripled since Q1, 2014. This represents a 300% growth rate and goes to show the proliferation rate of Android security risks.

With upcoming festive sales expected to lead to a rapid surge in online purchases via smartphones, banking credentials are expected to be at risk over Android phones.

Fake apps and games have been discovered over Google Play and other third-party app repositories. These sources will continue to plague Android devices in the near future.

Key findings of Quick Heal Q3 Threat Report for Windows:

Almost 5% of detected malware samples, or around 650,000 samples, were of the infamous Kido worm. This shows that there are several machines still running the now obsolete Windows XP.

Quick Heal Labs have found an increase in the number of adware that afflicts Windows machines. Such programs usually come bundled with legitimate software downloads.

A ransomware called “CryptoWall” has been very dominant this quarter and has been detected on a lot of machines. However, Quick Heal provides active protection against this malware.

“Malvertising” is a technique that is increasingly being used to spread malware. Legitimate advertising networks such as Google Doubleclick are being used for this.

The BadUSB vulnerability is going to reach more machines. Herein, the controller chips of USB sticks are reprogrammed to spread malware whenever they are plugged in.

The Q3 threat report vouches for the fact that Android malware threats are only increasing in numbers, and same goes with the Windows platform. Windows XP is still in use and it could be only a matter of time before attackers launch a full blown attack against systems running on this obsolete OS. The threat landscape in this quarter also saw some new types of attack vectors such as Malvertising and Bad USB vulnerability. While IT security technology can help users avoid cyber attacks, it cannot replace basic cyber awareness. A reliable security solution when coupled with education can go a long way into making our digital space safe and enriching.